Affiliation:
1. School of Cybersecurity, Chengdu University of Information Technology, Chengdu 610225, Sichuan, China
2. Institute of Computer Application, China Academy of Engineering Physics, Mianyang, Sichuan 621900, China
Abstract
The electromagnetic Trojan attack can break through the physical isolation to attack, and the leaked channel does not use the system network resources, which makes the traditional firewall and other intrusion detection devices unable to effectively prevent. Based on the existing research results, this paper proposes an electromagnetic Trojan detection method based on deep learning, which makes the work of electromagnetic Trojan analysis more intelligent. First, the electromagnetic wave signal is captured using software-defined radio technology, and then the signal is initially filtered in combination with a white list, a demodulated signal, and a rate of change in intensity. Secondly, the signal in the frequency domain is divided into blocks in a time-window mode, and the electromagnetic signals are represented by features such as time, information amount, and energy. Finally, the serialized signal feature vector is further extracted using the LSTM algorithm to identify the electromagnetic Trojan. This experiment uses the electromagnetic Trojan data published by Gurion University to test. And it can effectively defend electromagnetic Trojans, improve the participation of computers in electromagnetic Trojan detection, and reduce the cost of manual testing.
Funder
National Natural Science Foundation of China
Subject
Computer Networks and Communications,Information Systems
Reference12 articles.
1. Information leakage via electromagnetic emanation and effectiveness of averaging technique;H. Tanaka
2. Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
3. Electromagnetic circuit fingerprints for hardware trojan detection[C].;J. Balasch
4. Thermal Scans for Detecting Hardware Trojans
5. Ground Penetrating Radar Data Compression Acquisition Based on Perceptual Compression;W. C. Lu;Journal of Forestry Research,2011
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献